6.5
CVE-2019-18790
- EPSS 7.42%
- Veröffentlicht 22.11.2019 17:15:11
- Zuletzt bearbeitet 21.11.2024 04:33:34
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Digium ≫ Certified Asterisk Version13.21.0
Digium ≫ Certified Asterisk Version13.21.0 Updatecert1
Digium ≫ Certified Asterisk Version13.21.0 Updatecert2
Digium ≫ Certified Asterisk Version13.21.0 Updatecert3
Digium ≫ Certified Asterisk Version13.21.0 Updatecert4
Digium ≫ Certified Asterisk Version13.21.0 Updaterc1
Debian ≫ Debian Linux Version8.0
Debian ≫ Debian Linux Version9.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 7.42% | 0.913 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 3.9 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
| nvd@nist.gov | 5.8 | 8.6 | 4.9 |
AV:N/AC:M/Au:N/C:P/I:P/A:N
|
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.